139.8 KB | 3 files | DOC, PDF
Use this template to establish a control mechanism for official use of IM, create guidelines for employee use and describe expectations for business unit oversight of IM usage, among other things.
There are many security threats associated with instant messaging (IM) in the enterprise that increase a company's vulnerability. Use this template to establish a policy that will:
Rein in IM security risks in by downloading and tailoring this IM security policy.
The attached Zip file includes:
This guide will assist organizations and system owners in making practical sanitization decisions based on the categorization of confidentiality of their information. ... More >>
This publication provides a set of procedures for conducting assessments of security controls and privacy controls employed within federal information systems and organizations. ... More >>
This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity strategies tailored to their particular combinations of smart grid-related characteristics, risks, and vulnerabilities. ... More >>